Relay system can improve the secrecy of a wireless communication with physical layer security algorithms.Most of these algorithms include two stages:during the first stage, the source node sends coded messages to the relays, and during the second stage, the relays forward the received messages to the destination node.Usually, there is no protection during the first stage, thus most of the secrecy analysis is based on the assumption that there is no direct channel between the source and the eavesdropper.In a practical system, when the eavesdropper is located near the source, the secrecy rate of all these algorithms is down to zero.In this paper, a novel three-stage algorithm with hybrid signals is proposed, which can offer full protection on a relay system.The algorithm results in a non-convex optimal problem, and a sub-optimal solution with low computational complexity is proposed.The theoretical analysis and simulation results show that the proposed scheme can achieve much better secrecy performance than traditional algorithms when the eavesdropper is near the source node.
杨斌, 王文杰, 殷勤业. 基于混合信号的放大转发中继系统的物理层安全传输[J]. 电子学报, 2016, 44(2): 268-274.
YANG Bin, WANG Wen-jie, YIN Qin-ye. Secure Wireless Communication for AF Relay System with Hybrid Signals. Chinese Journal of Electronics, 2016, 44(2): 268-274.
[1] Wyner AD,The wire-tap channel[J].Bell Syst Tech J,1975,54(8):1355-1387.
[2] Csiszár I,Kørner J,Broadcast channels with confidential messages[J].IEEE Trans IT,1978,24(3):339-348.
[3] Leung-Yan-Cheong SK,Hellman ME.The gaussian wire-tap channel[J].IEEE Trans IT,1978,24(4):451-456.
[4] Goel S,Negi R.Guaranteeing secrecy using artificial noise[J].IEEE Trans WC,2008,7(6):2180-2189.
[5] Khisti A,Wornell G.Secure transmission with multiple antennas II:The MIMOME siretap channel[J].IEEE Trans IT,2010,56(11):5515-5532.
[6] Lai L,Gamal HE.The relay-eavesdropper channel:cooperation for secrecy[J].IEEE Trans IT,2008,54(9):4005-4019.
[7] Ekrem E,Ulukus S.Secrecy in cooperative relay broadcast channels[J].IEEE Trans IT,2011,57(1):137-155.
[8] Zhang J,Gursoy MC.Collaborative relay beamforming for secure broadcasting[A].Proc IEEE Wireless Commun Netw Conf.(WCNC)[C].Princeton,IEEE,2010.1-6.
[9] Zhang J,Gursoy MC.Relay beamforming strategies for physical-layer security[A].Proc 44th Annu Conf Inform Sci Syst.(CISS)[C].Sydney,IEEE,2010.1-6.
[10] Dong L,Han Z,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Trans Signal Process,2010,58(3):1875-1888.
[11] Yang Y,Li Q,et al.Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J].IEEE Signal Proc Letters,2013,20(1):35-38.
[12] Long H,Xiang W,et al.Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems[J].IEEE Trans IFS,2013,8(1):229-238.
[13] Wang HM,Yin Q,et al.Distributed beamforming for physical-layer security of two-way relay networks[J].IEEE Trans SP,2012,60(7):3532-3545.
[14] Mo J,Tao M,et al.Secure beamforming for MIMO two-way transmission with an untrusted relay[A].Proc IEEE Wireless Commun Netw Conf.(WCNC)[C].Shanghai,IEEE,2013.4180-4185.
[15] Li J,Petropulu AP,et al.On cooperative relaying schemes for wireless physical layer security[J].IEEE Trans SP,2011,59(10):4985-4997.
[16] Wang HM,Luo M,et al.Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI[J].IEEE Signal Proc Letters,2013,20(1):39-42.
[17] Wang HM,Yin Q,et al.Joint null-space beamforming and jamming to secure AF relay systems with individual power constraint[A].Acoustics,Speech and Signal Proc.(ICASSP),2013 IEEE International Conference on[C].Vancouver,IEEE,2013.2911-2914.
[18] Wang HM,Luo M,et al.Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks[J].IEEE Trans IFS,2013,8(12):2007-2020.
[19] Zheng G,Choo LC,et al.Optimal cooperative jamming to enhance physical layer security using relays[J].IEEE Trans SP,2011,59(3):1317-1322.
[20] Dong L,Yousefi'zadeh H,et al.Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper[A].Communications (ICC),2011 IEEE International Conference on[C].Kyoto,IEEE,2011.1-5.
[21] Tang L,Gong X,et al.Secure wireless communications via cooperative relaying and jamming[A].GC'11 workshop on physical-layer security[C].Houston,IEEE,2011.849-853.
[22] Tang X,Liu R,et al.Interference assisted secret communication[J].IEEE Trans IT,2011,57(5):3153-3167.
[23] Liu Y,Li J,et al.Destination assisted cooperative jamming for wireless physical-layer security[J].IEEE Trans IFS,2013,8(4):682-694.
[24] Park KH,Wang T,et al.On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming[J].IEEE J Select Areas Commun,2013,31(9):1741-1750.
[25] Yang B,Wang W,et al.Destination assisted secret wireless communication with cooperative helpers[J].IEEE Signal Proc.Letters,2013,20(11):1030-1033.
[26] Foschini GJ,Chizhik D,et al.Analysis and performance of some basic spacetime architectures[J].IEEE J Select Areas Commun,2013,21(1):303-320.
[27] Boyd S,Vandenberghe L,Convex Optimization[M].Combridge University Press,2004.